top of page

"WATCH: All ISIS Propaganda Videos Released This Week." Heavy.com. Accessed May 3, 2017. http://heavy.com/news/2015/05/new-isis-islamic-state-propaganda-youtube-videos-photos-pictures-screengrabs-screenshots-stills-may-2015/.


"What is ISIS' Appeal for Young People? .com." CNN. Accessed May 3, 2017. http://www.cnn.com/2015/02/25/middleeast/isis-kids-propaganda/.


"Why Facebook and Twitter Can’t Just Wipe Out ISIS Online." WIRED. Accessed May 3, 2017. https://www.wired.com/2015/11/facebook-and-twitter-face-tough-choices-as-isis-exploits-social-media/.


"Why ISIS Is Winning the Social Media War." WIRED. Accessed May 3, 2017. https://www.wired.com/2016/03/isis-winning-social-media-war-heres-beat/.


"Why Women Are a Not-so-secret Weapon for ISIS (Opinion) .com." CNN. Accessed May 3, 2017. http://www.cnn.com/2017/03/31/opinions/female-fighters-isis-behind-the-mask-omar-opinion/.


"Why Women Join ISIS | Time.com." TIME | Current & Breaking News | National & World Updates. Accessed May 3, 2017. http://time.com/4138377/women-in-isis/.


ПИР-Центр. Accessed May 3, 2017. http://pircenter.org/kosdata/page_doc/p2594_2.pdf.

"Militarised Conservation, Wildlife Trade and Global Terrorism – Conservation-Watch." Conservation-Watch. Accessed May 3, 2017. https://conservationwatch.wordpress.com/2016/11/11/militarised-conservation-wildlife-trade-and-global-terrorism/.


OECD.org - OECD. Accessed May 3, 2017. http://www.oecd.org/investment/Terrorism-corruption-criminal-exploitation-natural-resources-2016.pdf.


Oh, O., Agrawal, M. & Rao, H.R. Inf Syst Front (2011) 13: 33. doi:10.1007/    s10796-010-9275-8. Retrieved from http://link.springer.com/article/            10.1007/s10796-010-9275-8 



"Predatory Islamic State Wrings Money From Those It Rules - The New York Times." The New York Times - Breaking News, World News & Multimedia. Accessed May 3, 2017. https://www.nytimes.com/2015/11/30/world/middleeast/predatory-islamic-state-wrings-money-from-those-it-rules.html?smid=tw-share.


"Q&A: Protecting the Nation From Foreign Terrorist Entry To The United States | Homeland Security." Homeland Security |. Accessed May 3, 2017. https://www.dhs.gov/news/2017/03/06/qa-protecting-nation-foreign-terrorist-entry-united-states.


Schmitt, Gary J. Terrorism and the First Amendment. The Weekly Standard. Retrieved from https://www.aei.org/publication/terrorism-and-the-first-amendment/ 


"Selling the 'Fantasy': Why Young Women Would Join ISIS." ABC News. Accessed May 3, 2017. http://abcnews.go.com/International/young-women-join-isis/story?id=29112401.


The Soufan Group |. Accessed May 3, 2017. http://soufangroup.com/wp-content/uploads/2015/12/TSG_ForeignFightersUpdate_FINAL3.pdf.


Stern, J., & Berger, J. M. (2015). ISIS: The state of terror.


"The Sunni-Shia Divide." Council on Foreign Relations. Accessed May 3, 2017. http://www.cfr.org/peace-conflict-and-human-rights/sunni-shia-divide/p33176#!/?cid=otr-marketing_url-sunni_shia_infoguide.


"Syria's Civil War Explained from the Beginning | News | Al Jazeera." Al Jazeera: Live News | Bold Perspectives | Exclusive Films. Accessed May 3, 2017. http://www.aljazeera.com/news/2016/05/syria-civil-war-explained-160505084119966.html.


"Terrorism and Associations." Emory University School of Law. Accessed May 3, 2017. http://law.emory.edu/elj/content/volume-63/issue-3/articles/terrorism-associations.html.


"Terrorism in the Age of Twitter." The New Yorker. Accessed May 3, 2017. http://www.newyorker.com/news/john-cassidy/terrorism-in-the-age-of-twitter.


"Twitter Steps Up Efforts to Thwart Terroristsâ Tweets - The New York Times." The New York Times - Breaking News, World News & Multimedia. Accessed May 3, 2017. https://www.nytimes.com/2016/02/06/technology/twitter-account-suspensions-terrorism.html?_r=0.


U.S. Department of State | Home Page. Accessed May 3, 2017. https://www.state.gov/documents/organization/122599.pdf.


"UNITED NATIONS ACTION TO COUNTER TERRORISM." Welcome to the United Nations. Accessed May 3, 2017. http://www.un.org/en/counterterrorism/legal-instruments.shtml.



United Nations Office on Drugs and Crime. The use of the Internet for terrorist purposes. Retrieved from http://www.unodc.org/documents/frontpage/Use_of_Internet_for_Terrorist_Purposes.pdf    


The Washington Institute for Near East Policy - The Washington Institute for Near East Policy. Accessed May 3, 2017. http://www.washingtoninstitute.org/uploads/Documents/testimony/LevittTestimony20170213.pdf.

"About Aaron Y. Zelin." A Clearinghouse for Jihādī Primary Source Material, Original Analysis, and Translation Service. Accessed May 3, 2017. Retrieved from http://jihadology.net/about/about-me/.

"Annual Terrorist Attacks." Esri. Accessed May 3, 2017. Retrieved from https://storymaps.esri.com/stories/terrorist-attacks/?year=2017.

"Anonymous #OpCharlieHebdo Campaign Reveals Jihadist Facebook Profiles." International Business Times UK. Accessed May 3, 2017. http://www.ibtimes.co.uk/anonymous-opcharliehebdo-campaign-reveals-jihadist-facebook-profiles-1483154.

Beckett, Charlie. Fanning the flames: reporting on terror in the networked age. Retrieved from https://medium.com/@CharlieBeckett/fanning-the-flames-reporting-on-terror-in-the-networked-age-ff1d6ec62844#.ydvmek9ro 

"Big Brands Fund Terror Through Online Adverts | News." The Times & The Sunday Times. Accessed May 3, 2017. Retrieved from https://www.thetimes.co.uk/edition/news/big-brands-fund-terror-knnxfgb98.

Bott, Catherine; Dickens, Robertson; Moffitt, Jessica; Smith, Erik; Rowley, Thomas; Lark, Rosemary & Thompson, George. The Internet as a Terrorist Tool for Recruitment and Radicalization of Youth. White Paper. April (2009). Homeland Security Institute. Retrieved from http://www.homelandsecurity.org/docs/reports/Internet_Radicalization.pdf

Brookings - Quality. Independence. Impact. | Brookings Institution. Accessed May 3, 2017. Retrieved from https://www.brookings.edu/wp-content/uploads/2014/12/en_whos_who.pdf.

Brookings - Quality. Independence. Impact. | Brookings Institution. Accessed May 3, 2017. Retrieved https://www.brookings.edu/wp-content/uploads/2016/06/isis_twitter_census_berger_morgan.pdf.

Center for Cyber & Homeland Security | The George Washington University. Accessed May 3, 2017. Retrieved from https://cchs.gwu.edu/sites/cchs.gwu.edu/files/downloads/ISIS%20in%20America%20-%20Full%20Report.pdf.

Centre on Religion & Geopolitics. Accessed May 3, 2017. Retrieved from http://www.religionandgeopolitics.org/sites/default/files/Inside%20the%20Jihadi%20Mind.pdf.

"CHAPTER 13 Recruitment and Radicalization: The Role of Social Media and New Technology." Center for Complex Operations. Accessed May 3, 2017. Retrieved from http://cco.ndu.edu/News/Article/780274/chapter-13-recruitment-and-radicalization-the-role-of-social-media-and-new-tech/.

Clarion Project. Accessed May 3, 2017. Retrieved from http://qb5cc3pam3y2ad0tm1zxuhho-wpengine.netdna-ssl.com/wp-content/uploads/2014/09/Rumiyah-issue-seven.pdf.

The Constitution of the United States. National Constitution Center. Retrieved from http://constitutioncenter.org/media/files/                    constitution.pdf 



"Counterterrorism First Amendment Rights | Video." C-SPAN.org. Accessed May 3, 2017. Retrieved from https://www.c-span.org/video/?290703-1/counterterrorism-first-amendment-rights.

Daly, Sara A. and Scott Gerwehr. Al-Qaida: Terrorist Selection and Recruitment. Santa Monica, CA: RAND Corporation, 2006. Retrieved from http://www.rand.org/content/dam/rand/pubs/                reprints/2006/RAND_RP1214.pdf 

DML Associates LLC - Getting to the Root of the Matter - Fraud, Money Laundering, Due Diligence, Compliance Risk and Terrorist Finance. Accessed May 3, 2017. Retrieved from http://www.dmlassociatesllc.com/files/dml_business_model.pdf.

Duane, Kathleen Ann. The Advocacy of Terrorism on the Internet: Freedom of Speech Issues and the Material Support Statutes. Congressional Research Service. Retrieved from https://fas.org/sgp/crs/terror/R44626.pdf 


"Enemies at the Gates | Global Jihad (VICE on HBO: Season 3, Episode 12)." YouTube. Accessed May 3, 2017. Retrieved from https://www.youtube.com/watch?v=YRF6GLBSTYc.

Engel, Pamela. ISIS has mastered a crucial recruiting tactic no terrorist group has ever conquered. Business Insider: Military & Defense.  Retrieved from http://www.businessinsider.com/isis-is-revolutionizing-international-terrorism-2015-5 

"Environmental Crime Threatening Peace and Security, Finds New INTERPOL-UN Environment Report." UNEP RONA. Accessed May 3, 2017. Retrieved from http://www.rona.unep.org/news/2016/environmental-crime-threatening-peace-and-security-finds-new-interpol-un-environment.

"The Evolution of ISIS." Guide. Accessed May 3, 2017. Retrieved from http://www.sbs.com.au/guide/article/2016/08/25/evolution-isis.

"EXECUTIVE ORDER: PROTECTING THE NATION FROM FOREIGN TERRORIST ENTRY INTO THE UNITED STATES." Whitehouse.gov. Accessed May 3, 2017. Retrieved from https://www.whitehouse.gov/the-press-office/2017/01/27/executive-order-protecting-nation-foreign-terrorist-entry-united-states.

FATF-GAFI.ORG - Financial Action Task Force (FATF). Accessed May 3, 2017. http://www.fatf-gafi.org/media/fatf/documents/reports/BPP-combating-abuse-non-profit-organisations.pdf.

"Fears Grow over ISIL Recruitment of Tunisia Women - News from Al Jazeera." Al Jazeera: Live News | Bold Perspectives | Exclusive Films. Accessed May 3, 2017. Retrieved from http://www.aljazeera.com/news/2016/06/tunisia-worry-fear-grows-young-women-join-isil-160609060147143.html.

"Fears of Terror Export As ISIS 'caliphate' Shrinks .com." CNN. Accessed May 3, 2017. Retrieved from http://edition.cnn.com/2016/07/11/middleeast/isis-territory-analysis-lister/.

"Follow ISIS on Twitter: A Special Report on the Use of Social Media by Jihadists - INSITE ON TERRORISM." Latest Articles. Accessed May 3, 2017. Retrieved from http://news.siteintelgroup.com/blog/index.php/categories/jihad/entry/192-follow-isis-on-twitter-a-special-report-on-the-use-of-social-media-by-jihadists.

Gates, Scott & Podder, Sukanya. Social Media, Recruitment, Allegiance and the Islamic State. Terrorism Research Initiative. Retrieved from http://www.terrorismanalysts.com/pt/index.php/pot/article/view/446/html


Hooper, Amy E. Investigating Terrorism: The role of the First Amendment. Duke University School of Law. Retrieved from http://            scholarship.law.duke.edu/cgi/viewcontent.cgi?                        article=1106&context=dltr 


"How ISIS Makes (and Takes) Money .com." CNN. Accessed May 3, 2017. Retrieved from http://www.cnn.com/2015/02/19/world/how-isis-makes-money/index.html.

"How ISIS Games Twitter." The Atlantic. Accessed May 3, 2017. Retrieved from https://www.theatlantic.com/international/archive/2014/06/isis-iraq-twitter-social-media-strategy/372856/.

"How ISIS Islamic State Uses Social Media | ADL." Anti-Defamation League. Accessed May 3, 2017. Retrieved from https://www.adl.org/education/resources/reports/isis-islamic-state-social-media.

"Hundreds of Tunisian Women Join Jihadists in Syria: Minister - Times of India." The Times of India. Accessed May 3, 2017. Retrieved from http://timesofindia.indiatimes.com/world/middle-east/Hundreds-of-Tunisian-women-join-jihadists-in-Syria-Minister/articleshow/50050192.cms.


"The Hypnotic Power of ISIS Imagery in Recruiting Western Youth – ICSVE." ICSVE – International Center for the Study of Violent Extremism. Accessed May 3, 2017. http://www.icsve.org/brief-reports/the-hypnotic-power-of-isis-imagery-in-recruiting-western-youth-2/.


"ISIS Attacks Outside Its Self-Proclaimed Caliphate - The New York Times." The New York Times - Breaking News, World News & Multimedia. Accessed May 3, 2017. https://www.nytimes.com/interactive/2017/02/04/world/isis-remote-control-enabled-attack.html?_r=0.


"ISIS Goes Global: Mapping ISIS Attacks Around the World .com." CNN. Accessed May 3, 2017. http://www.cnn.com/2015/12/17/world/mapping-isis-attacks-around-the-world/.


"ISIS Recruitment: Social Media, Isolation, and Manipulation." Citizens for Global Solutions. Accessed May 3, 2017. http://globalsolutions.org/blog/2015/12/ISIS-Recruitment-Social-Media-Isolation-and-Manipulation.


"ISIS: Everything You Need to Know About the Group .com." CNN. Accessed May 3, 2017. http://www.cnn.com/2015/01/14/world/isis-everything-you-need-to-know/.



"ISIL: Twitter Grapples With ISIS and Terrorist Groups | Time.com." TIME | Current & Breaking News | National & World Updates. Accessed May 3, 2017.     

http://time.com/3319278/isis-isil-twitter/.


"Islamic State :: Jihad Intel." Jihad Intel. Accessed May 3, 2017. http://jihadintel.meforum.org/group/52/islamic-state-iraq-levant.


"The Islamic State | Mapping Militant Organizations." Stanford University. Accessed May 3, 2017. http://web.stanford.edu/group/mappingmilitants/cgi-bin/groups/view/1.


"The Islamic State’s (ISIS, ISIL) Magazine « Clarion Project." Clarion Project. Accessed May 3, 2017. https://clarionproject.org/islamic-state-isis-isil-propaganda-magazine-dabiq-50/.


"Jihadi Groups Dominate Global Terrorism | Centre on Religion & Geopolitics." Centre on Religion & Geopolitics. Accessed May 3, 2017. http://www.religionandgeopolitics.org/jihad/jihadi-groups-dominate-global-terrorism.


Just a Moment... Accessed May 3, 2017. http://www.quilliaminternational.com/wp-content/uploads/2015/10/FINAL-documenting-the-virtual-caliphate.pdf.


"Just a Moment..." Just a Moment... Accessed May 3, 2017. https://www.quilliaminternational.com/documenting-the-virtual-caliphate/.



Kaczynski, Andrew. 8 Ways Terrorists Use The Internet For Recruitment. Retrieved from https://www.buzzfeed.com/andrewkaczynski/8-ways-terrorists-use-the-internet-for-recruitment?utm_term=.icPk1B5Zr#.jhvYzL6jy 



London, Martin. Why Tolerate Terrorist Publications? The New York Times; The Opinion Pages. Retrieved from  https://www.nytimes.com/2015/01/24/opinion/why-tolerate-terrorist-        publications.html?_r=0 


Luhr, N. (2010). Iran, Social Media, and U.S. Trade Sanctions: The First Amendment Implications of U.S. Foreign Policy. First Amendment Law     Review 8(2), 500-532.Retrieved from http://heinonline.org/HOL/Page?handle=hein.journals/            falr8&div=16&g_sent=1&collection=journals 

Piles of Books

Bibliography

My Sources

Literature Review: About
Literature Review: Welcome
Literature Review: Homepage_about
Literature Review: About
  • linkedin

©2017 by Terrorism in the Digital Age. Proudly created with Wix.com

bottom of page